Network+ Practice Test

52 Questions | Attempts: 282
Share

SettingsSettingsSettings
Network Plus Quizzes & Trivia

This practice test should help you to prepare for the real exam!


Questions and Answers
  • 1. 

    Switches are meant to break up _______ domains and not _______ domains.

    Correct Answer
    collision, broadcast
    collision and broadcast
    collision broadcast
    collision broadcast
    Explanation
    The main function of switches is to break up collision domains, though they can also break up broadcast domains when VLANs are configured.

    Rate this question:

  • 2. 

    VLANs are used to split _______ domains.

    Correct Answer
    broadcast
    Explanation
    VLANs are used to split broadcast domains.

    Rate this question:

  • 3. 

    IGRP is a routing protocol that is proprietary to _______.

    Correct Answer
    Cisco
    Explanation
    IGRP is a Cisco proprietary distance vector protocol.

    Rate this question:

  • 4. 

    Your network utilization is high during the peak hours. You identify a particular hub that is being the bottleneck. This hub belongs to the accounts department and is suffering high collision rate. Which of the following *could be* the reason for this bottleneck?

    • A.

      The ERP application being used has crashed

    • B.

      The hub is incapable of handling the data transmission rate at that particular period.

    • C.

      A faulty NIC on one of the workstations

    Correct Answer(s)
    B. The hub is incapable of handling the data transmission rate at that particular period.
    C. A faulty NIC on one of the workstations
    Explanation
    As a basic analysis, it is clear that the problem could be with one of the workstations having a faulty NIC or that the hub is not able to handle the data load of the segment at the peak hour as the access rate and data transfer will be very high.

    Rate this question:

  • 5. 

    ISDN operates in OSI _______ layer and below.

    Correct Answer(s)
    Network
    network
    Explanation
    Although ISDN is also a WAN technology, it has identifiers that lie in the network layer. Hence it can be considered that the ISDN operates in the network layer and below.

    Rate this question:

  • 6. 

    Provide the valid host range for the IP address 172.12.10.17 255.255.255.252

    Correct Answer(s)
    172.12.10.17-18
    172.12.10.17 - 18
    172.12.10.17/18
    172.12.10.17 / 18
    Explanation
    The network ID for IP address 172.12.10.17 255.255.255.252 is 172.12.10.16, so the broadcast address will be 172.12.10.19

    Rate this question:

  • 7. 

    Which 802.x standard covers MAC addressing on Token Ring?

    Correct Answer(s)
    802.5
  • 8. 

    What is the NBTSTAT option -r used for?

    • A.

      To purge and reload the name table

    • B.

      To list the resolved adapters mac address

    • C.

      To list names resolved by broadcast and via wins

    Correct Answer
    C. To list names resolved by broadcast and via wins
  • 9. 

    You have installed a NIC in a workstation and now the hub where the workstation is connected has stopped working. What are the possible causes for the problem?

    • A.

      Faulty cable

    • B.

      Incorrect DMA setting

    • C.

      Incorrect data tranfer rate

    Correct Answer(s)
    A. Faulty cable
    C. Incorrect data tranfer rate
  • 10. 

    Your company wishes to set up a VPN between 2 branch offices and requires that the link supports non-IP protocols and authentication. Which protocols are required?

    • A.

      L2TP

    • B.

      PPTP

    • C.

      IPSEC

    • D.

      POP3

    Correct Answer(s)
    A. L2TP
    C. IPSEC
  • 11. 

    A host on subnet A cannot ping server Ham on subnet B although all other hosts on subnet A can reach the server. The host can ping everyone on the local subnet, however. What are the possible causes of the problem?

    • A.

      Misconfigured router

    • B.

      Incorrect default gateway

    • C.

      Incorrect subnet mask

    Correct Answer
    B. Incorrect default gateway
  • 12. 

    You want to enable WINS resolution on a windows 98 machine You start by rightclicking network neighborhood, choose properties, click tcp/ip, clickproperties. What do you do next?

    • A.

      Enter WINS server name

    • B.

      Click WINS configuration, select enable WINS resolution

    • C.

      Select enable WINS resolution

    Correct Answer
    B. Click WINS configuration, select enable WINS resolution
  • 13. 

    What Windows service is responsible for the dynamic name resolution of NETBIOS names?

    Correct Answer
    WINS
    wins
    Wins
  • 14. 

    Which protocol is responsible for monitoring and obtaining status information from capable devices?

    Correct Answer
    SNMP
    snmp
  • 15. 

    What can you use for terminal emulation to give the appearance of logging on locally to a unix host?

    Correct Answer
    Telnet
    telnet
    TELNET
  • 16. 

    Baseband communications provides which of the following?

    • A.

      Digital communications

    • B.

      Single frequency

    • C.

      Analog communications

    Correct Answer
    A. Digital communications
  • 17. 

    Which of the following protocols are supported by PPTP

    • A.

      IPX

    • B.

      IP

    • C.

      NetBeui

    Correct Answer
    C. NetBeui
  • 18. 

    A computer configured to use DHCP not able to locate a DHCP servier.  Automatic private IP address (APIPA) will assign which of the following?

    • A.

      172.254,10.21

    • B.

      169.254.10.21

    • C.

      192.254.10.21

    Correct Answer
    B. 169.254.10.21
  • 19. 

    A network technician is installing a small wireless network.  A requirement is that individual users must authenticate using usernames and passwords.  What technology would support encrypted usernames and passwords?

    Correct Answer
    WPA PEAP
    wpa peap
    Wpa Peap
  • 20. 

    A user reports that the wireless network is slow and she is able to see and access shared folders that are unfamiliar to her.  Which of the following is the cause of the problem?

    • A.

      The user is connecting to the wrong SSID

    • B.

      The SSID broadcast is disabled

    • C.

      Wireless router is misconfigured

    Correct Answer
    A. The user is connecting to the wrong SSID
  • 21. 

    Which of the security mitigation techniques is the most effectlive against attacks?

    • A.

      Effective security policies

    • B.

      User awareness training

    • C.

      Update antivirus definitions

    Correct Answer
    B. User awareness training
  • 22. 

    Device used to connect a WAN to a LAN?

    Correct Answer
    basic router
  • 23. 

    A new segment needs to be added to a network to provide access for 64 servers.  Which of the following subnets will provide the needed access and still conserve IP addresses?

    • A.

      192.168.1.0/23

    • B.

      192.168.1.0/24

    • C.

      192.168.1.0/25

    Correct Answer
    C. 192.168.1.0/25
  • 24. 

    POP3 protocols are what layer of the OSI model and what is it's function?

    Correct Answer
    application layer, receive email
    application layer, client receive email
    application layer, receive e-mail
    application layer, client receive e-mail
    application, incoming e-mail
  • 25. 

    10Base2 is usually a __________ network.

    Correct Answer
    token bus
  • 26. 

    10Base2 uses _______ cable type, with a max length of _______?

    Correct Answer
    coaxial, 185m
    coaxial, 185 meters
  • 27. 

    Ex:  PC1, PC2,  PC3, PC4 are connected through switch B.  PC5, PC6, PC7 are connected through switch C.  server 1, server 2, server 3, printers, and switch B and switch C are connected through switch A.  The router and modem are connected through switch A to another network.PC1 is unable to ping server 2 or PC7.  What physical network componet would most likely cause this problem to occur?

    Correct Answer
    switch A
    switch A failed
    switch A has failed
  • 28. 

    Ex:  PC1, PC2,  PC3, PC4 are connected through switch B.  PC5, PC6, PC7 are connected through switch C.  server 1, server 2, server 3, printers, and switch B and switch C are connected through switch A.  The router and modem are connected through switch A to another network.What would be a single point of failure with the highest impact to system?

    Correct Answer
    switch A
    switch A breakdown
    switch A failure
  • 29. 

    1)  Pin    Color                            1       green/white     2       green     3       blue/white     4       orange     5       orange/white     6       blue     7       brown/white     8       brown2)  Pin    Color     1       green/white     2       green     3       orange/white     4       blue     5       blue/white     6       orange     7       brown/white     8       brown 3)  Pin    Color                            1       orange/white     2       orange     3       blue/white     4       green     5       green/white     6       blue     7       brown/white     8       brown4)  Pin    Color                            1       orange/white     2       orange     3       green/white     4       blue     5       blue/white     6      green     7       brown/white     8       brownWhat is the connection standard of a 568A connector (choose 1, 2, 3, or 4)?

    Correct Answer
    2
  • 30. 

    1)  Pin    Color                            1       green/white     2       green     3       blue/white     4       orange     5       orange/white     6       blue     7       brown/white     8       brown2)  Pin    Color     1       green/white     2       green     3       orange/white     4       blue     5       blue/white     6       orange     7       brown/white     8       brown 3)  Pin    Color                            1       orange/white     2       orange     3       blue/white     4       green     5       green/white     6       blue     7       brown/white     8       brown4)  Pin    Color                            1       orange/white     2       orange     3       green/white     4       blue     5       blue/white     6      green     7       brown/white     8       brownWhat is the connection standard of a 568B connector (choose 1, 2, 3, or 4)?

    Correct Answer
    4
  • 31. 

    Ex:  PC1, PC2,  PC3, PC4 are connected through switch B.  PC5, PC6, PC7 are connected through switch C.  server 1, server 2, server 3, printers, and switch B and switch C are connected through switch A.  The router and modem are connected through switch A to another network.A company is improving it's network security and the system administrator has been asked to impliment a IDS.  What should the IDS be located between?

    Correct Answer
    router and switch A
    switch A and router
  • 32. 

    Which port is commonly used to remotely administer a router?

    Correct Answer
    23
    port 23
    port23
  • 33. 

    The company management wants you to connect the clients to a news server with a suitable protocol.  Which one should you consider using?

    Correct Answer
    NNTP
    nntp
    Explanation
    The Network News Transfer Protocol(NNTP) is the TCP/IP protocol used to access usenet news servers. Usenet news servers contain thousands of individual message boards known as news groups. Each newsgroup is about a particular subject. Chances are, if you have an interest, there is a news group about it. The details of the NNTP protocol are specified in RFC977.

    Rate this question:

  • 34. 

    You have received instructions to make use of a protocol to transmit username and passwords as clear-text.  Which protocol should you use?

    Correct Answer
    PAP
    pap
    Explanation
    Of all the authentication schemes in use today, the Password Authentication Protocol (PAP) is the simplest. When a client wants authentication to a server, the client will send the username and password to the server over the network. They are sent in clear text, that is to say, unencrypted. The server receives the username and password and compares them to an encrypted, locally stored table of usernmame and password pairs. If the username and password is a match, the client is authenticsted.

    Rate this question:

  • 35. 

    You have been given the instruction to use a protocol to authenticate resources which will include computers users, and printers using diffent operating systems in the company.  Which protocol should you use?

    Correct Answer
    LDAP
    ldap
    Explanation
    In large networks, most administrators have set up some kind of directory that keeps track of users and resources. In order to have a standard metod of accessing directories, the Lightweight Directory Access Protocal (LDAP) was developed. It allows clients to perform object lookups with a directory using a standard method.

    Rate this question:

  • 36. 

    Which authentication protocols can be used to transmit plain text passwords over the Internet?

    Correct Answer
    PAP
    pap
    Explanation
    Of all the authentication schemes in use today, the Password Authentication Protocol (PAP) is the simplest. When a client wants authentication to a server, the client will send the username and password to the server over the network. They are sent in clear text, that is to say, unencrypted. The server receives the username and password and compares them to an encrypted, locally stored table of usernmame and password pairs. If the username and password is a match, the client is authenticsted.

    Rate this question:

  • 37. 

    Which protocol, at the transport layer of the OSI model is the best choice for a delivery method?

    Correct Answer
    UDP
    udp
    udp protocol
  • 38. 

    You have just completed the installation of a basic router for the network.  However, the computer that is physically connected to the router is unable to get an IP address.  You type ipconfig as in the example below.ex:c:\>ipconfig/allWindows 2000 IP Configuration               Host Name ...............................: f0194062               Primary DNX Suffix ..................: company.com               Node Type ...............................: Hybrid               IP Routing Enabled ...................: No               WINS Proxy Enabled ................: No               DNS Suffix Search List ............: Ethernet adapter Wireless-G Notebook Adapter:               Connection-specific DNS Suffix:                Description ................................: E10071               Physical Address ......................: 00-A5-D7-C9-7E-18               DHCP Enabled ...........................: Yes               Autoconfiguration Enabled ........: Yes               IP Address ................................: 192.168.2.101               Subnet Mask .............................: 255.255.255.0               Default Gateway ......................: 192.168.1.1                DHCP Server ............................: 192.168.1.254               DNS Servers ............................: 192.168.1.253                                                                   192.168.1.252               Lease Obtained .......Monday, Dec 19, 2010  "TX2:35:07 PM               Lease Expires .........Tuesday Dec 20, 2010  "TX2:35:07 PMWhat should you do?

    Correct Answer
    DHCP
    configure DHCP
    configure DHCP correctly
  • 39. 

    What protocol can be used to automatically assign IP configurations to host computers?

    Correct Answer
    DHCP
    dhcp
  • 40. 

    When installing a legacy NIC card internal of computer, what jumper setting need to be set?

    Correct Answer
    memory address, irq, dma channel, i/o address
    dma channel, i/o address, irq, memory address
    irq, dma channel, i/o address, memory address
    i/o address, memory address, irq, dma channel
    dma channel, i/o address, memory address, irq
  • 41. 

    On a bus segment, you have introduced a new workstation after which the entire segment collapses. What could be the possible cause/causes for the problem?

    • A.

      Faulty termination

    • B.

      Faulty cabling

    • C.

      Faulty NIC

    Correct Answer(s)
    A. Faulty termination
    C. Faulty NIC
    Explanation
    The segment could collapse either due to faulty NIC that causes jabbering or due to faulty termination that leaves an open end.

    Rate this question:

  • 42. 

    What appication is a thicknet cable best suited for?

    Correct Answer(s)
    backbone
    network backbone
    Explanation
    A Thicknet cable is capable of better transmission than a Thinnet cable and is better suited as a backbone of a network, in the case of Bus topology.

    Rate this question:

  • 43. 

    What services can be supported on a Web server?

    • A.

      NNTP

    • B.

      SMTP

    • C.

      HTTP

    Correct Answer(s)
    A. NNTP
    B. SMTP
    C. HTTP
    Explanation
    The Web server allows NNTP, HTTP, FTP, WWW, SMTP and IRC services only.

    Rate this question:

  • 44. 

    Which of the following can you consider to secure your user's connection with the Intranet?

    • A.

      SSL

    • B.

      L2TP

    • C.

      IPSec

    • D.

      Kerberos

    Correct Answer(s)
    A. SSL
    B. L2TP
    C. IPSec
    D. Kerberos
    Explanation
    SSL is better used for securing internet connection although you can use it for intranet connection as well.

    Rate this question:

  • 45. 

    What service employs the reverse ARP function to map IP address to MAC address?

    Correct Answer(s)
    DHCP
    Explanation
    DHCP server employs reverse ARP in case of diskless nodes.

    Rate this question:

  • 46. 

    You have an intranet where a Web server services both internal as well as external users and is secured by a firewall. The internal users can access this server directly whereas the external users access it through the router. Lately the external users are complaining about frequent disconnection. What could the problem be?

    • A.

      High utilization on the router

    • B.

      Bad router configuration

    • C.

      Defective router

    Correct Answer
    A. High utilization on the router
  • 47. 

    A user cannot access the server, which is in a room across the hall. There are no other workstations nearby.What is the first step you should take to identify the problem?

    • A.

      Reboot the workstation

    • B.

      Look to see if the server is down

    • C.

      Try to access the server from another workstation

    Correct Answer
    B. Look to see if the server is down
  • 48. 

    What TCP header field does a network's end nodes use to keep track of packets in a connection?

    Correct Answer
    sequence numbers
  • 49. 

    You have a network that consists entirely of NT servers and workstations. You would like to use dynamic name resolution and minimize administration efforts. Which of the following do you implement?

    Correct Answer
    WINS
  • 50. 

    What cable would a network technicain make, in order to identify a physical interface problem?

    Correct Answer
    loopback

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 21, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 27, 2010
    Quiz Created by
    Big_d
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.